Professional Documents
Culture Documents
Info About Ethicalhacking
Info About Ethicalhacking
W
I
N
C
L
I
N
G
S
o
c
i
e
t
y
Ethical Hacking
19
th
ofAugust, 2006
Hyderabad, India
T
W
I
N
C
L
I
N
G
S
o
c
i
e
t
y
We appreciate
T
W
I
N
C
L
I
N
G
S
o
c
i
e
t
y
Outline
Anatomy of a hack
System Hacking
Sniffers
Denial of Service
uffer Overflows
Social Engineering
T
W
I
N
C
L
I
N
G
S
o
c
i
e
t
y
Know your enemy
Sun Tzu says in the 'Art of War',
If you know yourself but not the enemy, for every victory
gained, you will suffer defeat!
If you know the enemy and know yourself, you need not fear
the result of a hundred battles!
T
W
I
N
C
L
I
N
G
S
o
c
i
e
t
y
Know your enemy
&acker 'lasses
(cript )iddie
*lack hats
"hite hats
+rey hats
"hite hats
'onsulting firms
T
W
I
N
C
L
I
N
G
S
o
c
i
e
t
y
Know your enemy
Information Security " # I A
$ #onfidentiality, Integrity, Authentication %
It remains a fact however, that gaining unauthorized access is
a crime, no matter what the intent
T
W
I
N
C
L
I
N
G
S
o
c
i
e
t
y
History ! Trends in Hacking "ulture
T
W
I
N
C
L
I
N
G
S
o
c
i
e
t
y
Anatomy of a hack
T
W
I
N
C
L
I
N
G
S
o
c
i
e
t
y
Anatomy of a hack #$econnaissance%
Accessible hosts
/pen ports
0ocation of routers
/pen ports
System &acking
Sniffers
Social 'ngineering
(enial of Service
Session &i)acking
*uffer +verflows
,ootkits
S./ in)ection
#ry-togra-hy
T
W
I
N
C
L
I
N
G
S
o
c
i
e
t
y
'aintaining Access
-ootkits.
*ackdoors.
T
W
I
N
C
L
I
N
G
S
o
c
i
e
t
y
"overing Tracks
5echniues include!
5unnelling.
%isabling auditing
T
W
I
N
C
L
I
N
G
S
o
c
i
e
t
y
System Hacking
.rivilege escalation.
.assword cracking
%umpster %iving
)ey loggers
&iding files
(teganography
T
W
I
N
C
L
I
N
G
S
o
c
i
e
t
y
Sniffers
7etwork data.
(poofing.
.assive (niffers
Active (niffing
A-. spoofing.
%7( spoofing
T
W
I
N
C
L
I
N
G
S
o
c
i
e
t
y
Denial of Service
8ethods include!
,lood a network.
*andwidth#5hroughput attacks.
.rotocol attacks.
lackHat http(!!www)*lackhat)com!
Astalavista http(!!www)astalavista)com!
+eohapsis http(!!www)neohapsis)com!
,acketStorm http(!!packetstormsecurity)org!
Security-ocus http(!!www)securityfocus)com!
SecurityDocs http(!!www)securitydocs)com!
-oundStone http(!!www)foundstone)com!
T
W
I
N
C
L
I
N
G
S
o
c
i
e
t
y
ooks
Book cover pasted here sie is !c" # $c"
T
W
I
N
C
L
I
N
G
S
o
c
i
e
t
y
ooks
Book cover pasted here sie is !c" # $c"
T
W
I
N
C
L
I
N
G
S
o
c
i
e
t
y
App.a*s Technologies ,vt) .td)
http://www.applabs.com/
App.a*s is a glo*al /T services company speciali0ing
in software testing and development services)
/t is the preferred partner for third1party validation)
Special thanks
T
W
I
N
C
L
I
N
G
S
o
c
i
e
t
y
"omm2ault Systems #/ndia% ,vt) .td)
http://www.commvault.com/
"omm2ault is a Storage 'anagement3 ackup
and Disaster $ecovery company incorporated in 4SA
with its &lo*al Development "entre in Hydera*ad3 A,)
Special thanks
T
W
I
N
C
L
I
N
G
S
o
c
i
e
t
y
A*out us
Charter
,romote3 Develop and Showcase Open Source software)
Legal
$egistered 5not for profit6 Society under A),) Societies $eg Act3 7889)
Management
&overned *y Society y1.aws) .ed *y :1mem*er *oard of directors)
T
W
I
N
C
L
I
N
G
S
o
c
i
e
t
y
A*out us )))
website
%%%&t%inc'ing&org
mailing list
groups&yahoo&co"(group(t%inc'ing
forum )soft%are **+ t%inc'ing,
http-((%%%&nabb'e&co"(t%inc'ing*f1!$.1&ht"'
T
W
I
N
C
L
I
N
G
S
o
c
i
e
t
y
A*out us )))
irc
/twincling
helpline
+91-99496 50605
+91-99499 91585
more info
'r) Kumar S) +) 1 Public Relations & Strategic Alliances